Skip to content

Conversation

@renovate
Copy link

@renovate renovate bot commented Aug 21, 2020

WhiteSource Renovate

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
lodash (source) 4.17.15 -> 4.17.21 age adoption passing confidence

GitHub Vulnerability Alerts

CVE-2020-8203

Versions of lodash prior to 4.17.19 are vulnerable to Prototype Pollution. The function zipObjectDeep allows a malicious user to modify the prototype of Object if the property identifiers are user-supplied. Being affected by this issue requires zipping objects based on user-provided property arrays.

This vulnerability causes the addition or modification of an existing property that will exist on all objects and may lead to Denial of Service or Code Execution under specific circumstances.

CVE-2021-23337

lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function.


Release Notes

lodash/lodash

v4.17.21

Compare Source

v4.17.20

Compare Source

v4.17.19

v4.17.16

Compare Source


Configuration

📅 Schedule: "" (UTC).

🚦 Automerge: Enabled.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, click this checkbox.

This PR has been generated by WhiteSource Renovate. View repository job log here.

@renovate renovate bot force-pushed the renovate/npm-lodash-vulnerability branch from 967d1b1 to c2a46b3 Compare May 9, 2021 22:53
@renovate renovate bot changed the title Update dependency lodash to v4.17.19 [SECURITY] Update dependency lodash to v4.17.21 [SECURITY] May 9, 2021
@ptb ptb closed this Mar 20, 2024
@ptb ptb deleted the renovate/npm-lodash-vulnerability branch March 20, 2024 19:04
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants